-
公开(公告)号:US20250005184A1
公开(公告)日:2025-01-02
申请号:US18345254
申请日:2023-06-30
Applicant: Cisco Technology, Inc.
Inventor: Rajiv Asati , Akram Ismail Sheriff
Abstract: A method to protect data in a database. The method includes detecting an actual flow path for an API call between a source node and a destination node, determining whether the actual flow path for the API call deviates from an expected flow path for the API call, and in response to determining that the actual flow path for the API call deviates from the expected flow path by a predetermined threshold, denying access to data sought by the API call at the destination node.
-
公开(公告)号:US12185218B2
公开(公告)日:2024-12-31
申请号:US17562715
申请日:2021-12-27
Applicant: Cisco Technology, Inc.
Inventor: Vinay Saini , Jerome Henry , Robert E. Barton
Abstract: Aspects described herein include a method and related network device and computer program product. The method includes receiving a neighbor report that indicates whether a first network device in an environment is advertising broadcast services and generating, using the neighbor report, a broadcast optimization map that indicates a set of network devices in the environment that will provide a broadest coverage of broadcast services within the environment. The set corresponds to a minimum count of network devices that supports all current broadcast streams by one or more client devices in the environment.
-
公开(公告)号:US12184642B2
公开(公告)日:2024-12-31
申请号:US17669241
申请日:2022-02-10
Applicant: Cisco Technology, Inc.
Inventor: Shayne Miel , Richard Edward Harang , Joshua Brian Lindauer
Abstract: This disclosure describes techniques and mechanisms for authenticating user device(s) by ensuring that two user devices accessing the same online service are co-located, while protecting private information associated with a user's network landscape and/or Bluetooth device(s). The techniques may ensure that a second factor authentication device is in the same location as a first factor access device, and that a first factor access device is in the same location as it was during previous access attempts).
-
184.
公开(公告)号:US12184543B2
公开(公告)日:2024-12-31
申请号:US17239003
申请日:2021-04-23
Applicant: Cisco Technology, Inc.
Inventor: Rakesh Gandhi , Sagar Soni , Patrick Khordoc
IPC: H04L69/22 , H04L41/142 , H04L45/24 , H04L45/50
Abstract: Presented herein is an “In-situ OAM” (IOAM) mechanism that uses a Segment Routing-Multiprotocol Label Switching (SR-MPLS) IOAM segment identifier that can selectively collect IOAM data from “target” network nodes along a data packet path. In one embodiment, a method includes receiving, at a first network node in the SR-MPLS network, a data packet that includes an MPLS label stack comprising a plurality of segment identifiers (SIDs) associated with a plurality of network nodes. The MPLS label stack includes a first SID associated with the first network node. The method includes determining whether the first SID is an IOAM SID or a regular SID. Upon determining that the first SID is the IOAM SID, the method includes implementing an IOAM function at the first network node. Upon determining that the first SID is the regular SID, the method includes processing the data packet without implementing an IOAM function.
-
公开(公告)号:US12184539B2
公开(公告)日:2024-12-31
申请号:US18303493
申请日:2023-04-19
Applicant: Cisco Technology, Inc.
Inventor: Anubhav Gupta , Rex Fernando , Sanjay Kumar Hooda , Syam Sundar Appala , Samir Thoria
IPC: H04L45/302 , H04L12/28 , H04L45/74 , H04L47/20
Abstract: In one embodiment, a method by an edge router configured to operate at a first site of a software-defined wide-area network includes receiving a data packet from a first host located in the first site, where the data packet is destined to a second host located in a second site, determining that an identifier of a second group to which the second host belongs is not available at the edge router, sending a request for an identifier of the second group to a network apparatus, where the request may comprise an address of the second host, receiving a response comprising the identifier of the second group from the network apparatus, determining that the second group is a destination group, applying one or more policies associated with the destination group to the data packet, and causing the data packet to be routed to the second host.
-
公开(公告)号:US12184516B2
公开(公告)日:2024-12-31
申请号:US17869085
申请日:2022-07-20
Applicant: Cisco Technology, Inc.
Inventor: Chidambaram Arunachalam , David C. White, Jr.
IPC: H04L41/5074 , G06F40/30 , H04L51/02
Abstract: A method is provided that is performed by a computer-implemented user support bot. The method includes obtaining from a user a support request related to software and/or hardware used, or to be used, by the user; obtaining user lifecycle journey information that tracks deployment, adoption and/or use by the user of the software and/or hardware; determining a user intent for the support request based on the user lifecycle journey information when there is ambiguity as to the user intent based solely on the support request; and providing a response to the support request based on the user intent.
-
公开(公告)号:US12184471B2
公开(公告)日:2024-12-31
申请号:US18220645
申请日:2023-07-11
Applicant: Cisco Technology, Inc.
Inventor: Ricardo V. Oliveira , Matias Fontanini
IPC: H04L41/046 , H04L41/12 , H04L43/045 , H04L43/50
Abstract: Techniques for performing traffic outage detection in the Internet are disclosed. In some embodiments, a system, process, and/or computer program product for traffic outage detection in the Internet includes deploying a plurality of agents and a plurality of tests to be executed by the deployed agents; collecting path trace data from the plurality of agents to identify one or more terminal events; and detecting a network outage based on the one or more terminal events.
-
公开(公告)号:US12182288B2
公开(公告)日:2024-12-31
申请号:US17490344
申请日:2021-09-30
Applicant: Cisco Technology, Inc.
Inventor: Allison Renner Walton , Ana Andrijic , Jazzmine Marie White , David C. White, Jr.
IPC: G06F21/62
Abstract: Techniques are provided herein for remediating storage of sensitive data on a hardware device. In one example, a request to remediate storage of sensitive data on a hardware device is obtained. In response to the request, a database is automatically searched. The database correlates the hardware device with an indication of how to remediate the storage of the sensitive data on the hardware device. Based on the database, the storage of the sensitive data on the hardware device is remediated.
-
189.
公开(公告)号:US20240430767A1
公开(公告)日:2024-12-26
申请号:US18823876
申请日:2024-09-04
Applicant: Cisco Technology, Inc.
Inventor: Jis Abraham , Pavan Kumar Devulacheruvu Nageswararao , Venkata Mohana Krishna Prasanna Anjaneyulu Pendela
Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media to address bearer loss during inter-radio access technology (RAT) handovers. A method includes sending a create bearer request for establishing a service for the mobile device using a first connection; receiving a create bearer response message to setup a second connection for the mobile device to continue the service; and, in response to the create bearer response message, sending an update bearer request message to provide the mobile device with the QoS information associated with the second connection, the QoS information allowing the mobile device to verify an existing QoS flow to continue the service after the handover. In some cases, a user equipment (UE) may delete a mapping between a QoS information when a previous message does not include an evolved packet core (EPC) bearer indicator (EBI) that identifies QoS policies.
-
公开(公告)号:US20240430338A1
公开(公告)日:2024-12-26
申请号:US18829034
申请日:2024-09-09
Applicant: Cisco Technology, Inc.
Inventor: Kyle Andrew Donald Mestery , Vincent E. Parla
IPC: H04L67/561 , H04L9/40 , H04L12/46 , H04L45/00 , H04L45/42 , H04L61/103 , H04L61/4511 , H04L67/02 , H04L67/101 , H04L67/1012 , H04L67/141 , H04L67/562
Abstract: Techniques for managing migrations of QUIC connection session(s) across proxy nodes, data centers, and/or private application nodes are described herein. A global key-value datastore, accessible by proxy nodes and/or application nodes, may store mappings between a first QUIC connection, associated with a proxy node and a client device, on the frontend of the proxy node and a second QUIC connection, associated with the proxy node and an application node, on the backend of the proxy node. With the global key-value datastore being accessible by the proxy nodes, when a proxy node receives a QUIC packet on the front end or the back end, the proxy node may determine where to map this connection to on the opposite end. Additionally, with the global key-value datastore being accessible to the application nodes, when an application node receives a QUIC packet, the application node may determine the client device associated with the connection.
-
-
-
-
-
-
-
-
-